Changing the monolith—Part 2: Whose support do you need?

Credit to Author: Todd VanderArk| Date: Thu, 16 Jan 2020 18:00:28 +0000

Transformation can be a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization.

The post Changing the monolith—Part 2: Whose support do you need? appeared first on Microsoft Security.

Read more

How to implement Multi-Factor Authentication (MFA)

Credit to Author: Elizabeth Wolk| Date: Wed, 15 Jan 2020 17:00:21 +0000

The goal of MFA implementation is to enable it for all your users, on all of your systems, all of the time. Learn how to successfully roll out and support MFA in your organization.

The post How to implement Multi-Factor Authentication (MFA) appeared first on Microsoft Security.

Read more

Rethinking cyber scenarios—learning (and training) as you defend

Credit to Author: Elizabeth Wolk| Date: Tue, 14 Jan 2020 17:00:55 +0000

Gamified cybersecurity learning is an increasingly important must-have in your SecOps program, from understanding basic concepts all the way into advanced attacker and defense scenarios. Microsoft and Circadence are working together to democratize and scale cyber readiness globally.

The post Rethinking cyber scenarios—learning (and training) as you defend appeared first on Microsoft Security.

Read more

Key Technology Trends for 2020

Credit to Author: Guest Blogger| Date: Wed, 08 Jan 2020 21:21:13 +0000

Craig Resnick covers the PLC, PAC, HMI, OIT and Industrial PC markets as well as the Packaging, Plastics and Rubber Industries for ARC.  He is the primary analyst for many… Read more »

The post Key Technology Trends for 2020 appeared first on Schneider Electric Blog.

Read more

Changing the monolith—Part 1: Building alliances for a secure culture

Credit to Author: Todd VanderArk| Date: Thu, 09 Jan 2020 17:00:23 +0000

Digital transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization.

The post Changing the monolith—Part 1: Building alliances for a secure culture appeared first on Microsoft Security.

Read more

Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks

Credit to Author: Eric Avena| Date: Wed, 18 Dec 2019 18:00:24 +0000

Microsoft Defender ATP data scientists and threat hunters collaborate to use a data science-driven approach to detecting RDP brute force attacks to protect customers against real-world threats.

The post Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks appeared first on Microsoft Security.

Read more

Multi-stage downloader Trojan sLoad abuses BITS almost exclusively for malicious activities

Credit to Author: Eric Avena| Date: Thu, 12 Dec 2019 17:30:26 +0000

Many of today’s threats evolve to incorporate as many living-off-the-land techniques as possible into the attack chain. The PowerShell-based downloader Trojan known as sLoad, however, puts all its bets on BITS. Background Intelligent Transfer Service (BITS) is a component of the Windows operating system that provides an ability to transfer files in an asynchronous and…

The post Multi-stage downloader Trojan sLoad abuses BITS almost exclusively for malicious activities appeared first on Microsoft Security.

Read more

The quiet evolution of phishing

Credit to Author: Eric Avena| Date: Wed, 11 Dec 2019 17:00:56 +0000

In 2019, we saw phishing attacks reach new levels of creativity and sophistication. Read about the most notable phishing techniques we spotted in the past year.

The post The quiet evolution of phishing appeared first on Microsoft Security.

Read more